<< Prev Question Next Question >>

Question 133/269

An IS auditor has found that an organization is unable to add new servers on demand in a cost-efficient manner Which of the following is the auditor s BEST recommendation?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (269q)
Question 1: Which of the following is MOST important to consider when cr...
Question 2: Which of the following controls MOST effectively reduces the...
Question 3: Which of the following requirements in a document control st...
Question 4: Which of the following is the PRIMARY reason for database op...
Question 5: During an audit of the organization's data privacy policy, t...
Question 6: Which of the following is the BEST method for converting a f...
Question 7: A CIO has asked an IS auditor to implement several security ...
Question 8: Which of the following should be an IS auditor's PRIMARY con...
Question 9: Which of the following is the PRIMARY benefit of implementin...
Question 10: An organization is currently replacing its accounting system...
Question 11: A company has implemented an IT segregation of duties policy...
Question 12: Which of the following BEST enables an IS auditor to identif...
Question 13: Which of the following is an IS auditor s GREATEST concern w...
Question 14: When testing segregation of duties, which of the following a...
Question 15: A security administrator should have read-only access for wh...
Question 16: Which of the following is an example of a data analytics use...
Question 17: During a security audit, which of the following is MOST impo...
Question 18: Which of the following should an IS auditor verify when audi...
Question 19: Which of the following is the BEST method for uncovering sha...
Question 20: The MAJOR reason for segregating test programs from producti...
Question 21: An IS auditor has discovered that unauthorized customer mana...
Question 22: Which of the following is the GREATEST risk of cloud computi...
Question 23: Which of the following is MOST important to helping incident...
Question 24: One advantage of monetary unit sampling is the fact that:...
Question 25: While executing follow-up activities, an IS auditor is conce...
Question 26: Which of the following BEST describes an audit risk?...
Question 27: Which of the following would be the MOST appropriate reason ...
Question 28: Which of the following would be MOST helpful in ensuring sec...
Question 29: The IS auditor of a power company finds that the radio link ...
Question 30: What is the FIRST step an auditor should take when beginning...
Question 31: To preserve chain-of-custody following an internal server co...
Question 32: Which of the following entities is BEST suited to define the...
Question 33: An IS auditor finds that a mortgage origination team receive...
Question 34: Which of the following should an IS auditor use when verifyi...
Question 35: Which of the following is the BEST way to address ongoing co...
Question 36: A small startup organization does not have the resources to ...
Question 37: Which of the following components of a scheduling tool BEST ...
Question 38: Which of the following occurs during the issues management p...
Question 39: Which of the following should an IS auditor recommend to red...
Question 40: An organization is considering outsourcing the processing of...
Question 41: Which of the following BEST indicates the effectiveness of a...
Question 42: Which of the following validation techniques would BEST prev...
Question 43: A review of an organization's IT portfolio revealed several ...
Question 44: Which of the following is MOST important for an IS auditor t...
Question 45: The BEST way to evaluate a shared control environment is to ...
Question 46: An IS auditor finds that confidential company data has been ...
Question 47: An organization recently implemented an industry-recognized ...
Question 48: An IS auditor learns a server administration team regularly ...
Question 49: Adopting a service-oriented architecture would MOST likely:...
Question 50: Assessments of critical information systems are based on a c...
Question 51: Which of the following methods should be used to purge confi...
Question 52: An employee transfers from an organization's risk management...
Question 53: The MOST effective method for an IS auditor to determine whi...
Question 54: Which of the following MOST efficiently protects computer eq...
Question 55: An IS auditor notes that application super-user activity was...
Question 56: Which of the following is MOST important to ensure that elec...
Question 57: What is an IS auditor's BEST recommendation for management i...
Question 58: Which of the following is the PRIMARY advantage of the IT po...
Question 59: While reviewing similar issues in an organization s help des...
Question 60: A legacy application is running on an operating system that ...
Question 61: Which of the following is the MOST critical characteristic o...
Question 62: An organization has decided to migrate payroll processing to...
Question 63: Which of the following methods should be used to effectively...
Question 64: An organization was recently notified by its regulatory body...
Question 65: An organization's plans to implement a virtualization strate...
Question 66: An IS auditor has been asked to perform a post-implementatio...
Question 67: Which of the following is MOST important when planning a net...
Question 68: IS audit is asked 10 explain how local area network (LAN) se...
Question 69: Which of the following provides the BEST audit evidence that...
Question 70: The lack of which of the following represents the GREATEST r...
Question 71: An organization plans to launch a social media presence as p...
Question 72: Which of the following would BEST provide executive manageme...
Question 73: Which of the following would be MOST important to include in...
Question 74: Which of the following is the MOST effective way to minimize...
Question 75: A previously agreed-upon recommendation was not implemented ...
Question 76: An accounting department uses a spreadsheet to calculate sen...
Question 77: Which of the following will BEST protect the confidentiality...
Question 78: During a vulnerability assessment, an IS auditor finds a hig...
Question 79: Which of the following would BEST prevent data from being or...
Question 80: To create a digital signature in a message using asymmetric ...
Question 81: Which of the following is the MOST effective way to assess w...
Question 82: Which of the following is a reason for implementing a decent...
Question 83: During a review of a production schedule, an IS auditor obse...
Question 84: A recent audit identified duplicate software licenses and te...
Question 85: Which of the following observations noted during a review of...
Question 86: Which of the following should be an IS auditor's FIRST actio...
Question 87: Which of the following is MOST important to include in a bus...
Question 88: Which of the following is MOST important to include in foren...
Question 89: Which of the following is corrective control?...
Question 90: ..risk that the IS auditor will not find an error that has o...
Question 91: Which of the following IS audit findings should be of GREATE...
Question 92: An IS auditor concludes that a local area network's (LAN's) ...
Question 93: Which of the following methodologies is MOST appropriate to ...
Question 94: To maintain the confidentiality of information moved between...
Question 95: An IS auditor finds multiple situations where the help desk ...
Question 96: Due to the small size of the payroll department, an organiza...
Question 97: Which of the following would BEST facilitate the detection o...
Question 98: Following a security breach, in which a hacker exploited a w...
Question 99: Which of the following a the MOST important prerequisite for...
Question 100: During an audit of a payroll system, an IS auditor identifie...
Question 101: Which of the following procedures should be implemented prio...
Question 102: The GREATEST risk of database renormalization is:...
Question 103: An IS auditor begins an assignment and identifies audit comp...
Question 104: An IS auditor was involved in the design phase for a new sys...
Question 105: The IS auditor's PRIMARY role in control self-assessment (CS...
Question 106: What is the MOST important business concern when an organiza...
Question 107: When designing metrics for information security, the MOST im...
Question 108: An organization using instant messaging to communicate with ...
Question 109: An IS auditor identifies key controls that have been overrid...
Question 110: The PRIMARY reason an IS department should analyze past inci...
Question 111: An IS auditor performing an audit of backup procedures obser...
Question 112: On a daily basis, an in-house development team moves duplica...
Question 113: An organization is using a single account shared by personne...
Question 114: During an audit of information security procedures of a larg...
Question 115: A large insurance company is about to replace a major financ...
Question 116: internal IS auditor recommends that incoming accounts payabl...
Question 117: An IS auditor notes that several users have not logged into ...
Question 118: Which of the following is the MOST important process to ensu...
2 commentQuestion 119: An IS auditor is evaluating a virtual server environment and...
Question 120: maturity model is useful in the assessment of IT service man...
Question 121: Which of the following would an IS auditor recommend as the ...
Question 122: Which of the following is the MOST effective control to ensu...
Question 123: Since data storage of a critical business application is on ...
Question 124: Which of the following is the MOST important reason to use s...
Question 125: The quality assurance (QA) function should be prevented from...
Question 126: An IS auditor discovered abnormalities in a monthly report g...
Question 127: After an external IS audit, which of the following should be...
Question 128: Which of the following presents the GREATEST concern when im...
Question 129: Which of the following cloud deployment models would BEST me...
Question 130: Which of the following is the MOST effective control to mini...
Question 131: During the implementation of an upgraded enterprise resource...
Question 132: Which of the following is the BEST approach to identify whet...
Question 133: An IS auditor has found that an organization is unable to ad...
Question 134: Which of the following is MOST important to ensure when plan...
Question 135: An IS auditor found that a company executive is encouraging ...
Question 136: Which of the following would BEST enable effective IT resour...
Question 137: Which of the following provides the GREATEST assurance that ...
Question 138: The BEST data backup strategy for mobile users is to:...
Question 139: mission-critical applications with a low recovery time objec...
Question 140: When engaging services from external auditors, which of the ...
Question 141: Which of the following is the MOST important consideration f...
Question 142: An IS auditor discovers that validation controls in a web ap...
Question 143: An organization has agreed to perform remediation related to...
Question 144: Which of the following is the MOST significant risk associat...
Question 145: As part of an IS audit, the auditor notes the practices list...
Question 146: What would be an IS auditors GREATEST concern when using a t...
Question 147: Which of the following will BEST help to ensure that an in-h...
Question 148: The MOST important reason for documenting all aspects of a d...
Question 149: A multinational organization is integrating its existing pay...
Question 150: What is the GREASTEST concern for an IS auditory reviewing c...
Question 151: An IS auditor finds that firewalls are outdated and not supp...
Question 152: Which of the following poses the GREATEST risk to the enforc...
Question 153: The PRIMARY advantage of object oriented technology is enhan...
Question 154: During audit planning, an IS auditor walked through the desi...
Question 155: An organization offers an online information security awaren...
Question 156: The GREATEST benefit of risk-based auditing is that it:...
Question 157: A security regulation requires the disabling of direct admin...
Question 158: During a review of information security procedures for disab...
1 commentQuestion 159: Which type of control is being implemented when a biometric ...
Question 160: A sales representative is reviewing the organization's feedb...
Question 161: Which of the following is MOST important in the audit qualit...
Question 162: Which of the following should be performed immediately after...
Question 163: A vulnerability in which of the following virtual systems wo...
Question 164: In a typical SDLC, which group is PRIMARILY responsible for ...
Question 165: Which of the following would an IS auditor consider to be th...
Question 166: What should an IS auditor do when informed that some recomme...
Question 167: The information security function in a large organization is...
Question 168: An IS auditor has discovered that a cloud-based application ...
Question 169: An organization transmits large amount of data from one inte...
Question 170: Which of the following controls should be implemented to BES...
Question 171: Which of the following is the GREATEST concern when an organ...
Question 172: An organization has outsourced its data leakage monitoring t...
Question 173: Which of the following would be MOST critical for an IS audi...
Question 174: While evaluating an organization's program for tracking syst...
Question 175: Following the sale of a business division, employees will be...
Question 176: Which of the following should be of GREATEST concern to an o...
Question 177: A start-up company acquiring for its order-taking system is ...
Question 178: An IS auditor observes that an organization s critical IT sy...
Question 179: Which of the following is the GREATEST benefit of implementi...
Question 180: An organization has software that is not compliant with data...
Question 181: Which of the following would be an IS auditor's GREATEST con...
Question 182: Which of the following is the BEST reason to perform root ca...
Question 183: An internal audit department recently established a quality ...
Question 184: An IS auditor reviewing an incident management process ident...
Question 185: Which of the following is the BEST approach to help ensure e...
Question 186: A technology service organization has recently acquired a ne...
Question 187: Which of the following should MOST concern an IS auditor rev...
Question 188: Which of the following is the GREATEST risk resulting from c...
Question 189: An IS auditor is conducting a review of an organization s in...
Question 190: An effective implementation of security roles and responsibi...
Question 191: An organization recently experienced a phishing attack that ...
Question 192: Which of the following is the BEST way to control the concur...
Question 193: Which of the following it BEST enabled by following a config...
Question 194: Due to cost restraints, a company defers the replacement of ...
Question 195: An organization has established hiring policies and procedur...
Question 196: An IS auditor is a member of an application development team...
Question 197: What is an IS auditor's BEST recommendation to management if...
Question 198: An organization allows employees to use personally owned mob...
Question 199: Which of the following group is MOST likely responsible for ...
Question 200: An IS auditor performing an application development review a...
Question 201: An audit team has a completed schedule approved by the audit...
Question 202: Which of the following would be MOST important to update onc...
Question 203: Which of the following would be MOST helpful when assessing ...
Question 204: Which of the following should the IS auditor do FIRST to ens...
Question 205: Which of the following is the PRIMARY responsibility of an i...
Question 206: An IT department installed critical patches provided by the ...
Question 207: An IS auditor plans to review all access attempts to a video...
Question 208: Which of the following should an IS auditor recommend to fac...
Question 209: Which of the following is the MOST appropriate action to for...
Question 210: The risk that the IS auditor will not find an error that has...
Question 211: Which of the following is the BEST physical security solutio...
Question 212: An organization has implemented an automated match between p...
Question 213: An IS auditor is assessing an organization's data loss preve...
Question 214: Which of the following is the PRIMARY objective of the IS au...
Question 215: Which of the following is the GREATEST concern with conducti...
Question 216: To help ensure the organization s information assets are ade...
Question 217: Which of the following is MOST likely to be prevented by a f...
Question 218: Of the following, who should authorize a project management ...
Question 219: MOST effective way to determine if IT is meeting business re...
Question 220: Previous audits have found that a large organization has had...
Question 221: Which of the following provides the BEST evidence of the eff...
Question 222: Buffer overflow in an Internet environment is of particular ...
Question 223: Which of ihe following should be done FIRST to effectively d...
Question 224: Capacity management enables organizations to:...
Question 225: An airlines online booking system uses an automated script t...
Question 226: When reviewing the effectiveness of data center operations, ...
Question 227: Which of the following is MOST important for an IS auditor t...
Question 228: Which of the following BEST demonstrates to an IS auditor th...
Question 229: Which of the following should be of GREATEST concern to an I...
Question 230: An organization is developing data classification standards ...
Question 231: When an organization is having new software implemented unde...
Question 232: Which of the following is MOST likely to be included in a po...
Question 233: During an audit, it is discovered that several suppliers wit...
Question 234: Which of the following is the BEST type of backup to minimiz...
Question 235: An IS auditor auditing the effectiveness of utilizing a hot ...
Question 236: Which of the following activities would allow an IS auditor ...
Question 237: An IS auditor is reviewing the upgrading of an operating sys...
Question 238: An IS auditor has completed a review of an outsourcing agree...
Question 239: An IS auditor has performed an agreed-upon procedures engage...
Question 240: Which of the following is MOST important for an IS auditor t...
Question 241: Which of the following would be the GREATEST concern to an I...
Question 242: Which of the following types of controls would BEST facilita...
Question 243: In a decentralized organization, the selection and purchase ...
Question 244: An IS auditor is using data analytics in an audit and has ob...
Question 245: Which of the following is the MOST efficient solution for a ...
Question 246: An organization s data retention policy states that all data...
Question 247: The BEST method an organization can employ to align its busi...
Question 248: For an organization which uses a VoIP telephony system exclu...
Question 249: An IS auditor discovers instances where software with the sa...
Question 250: Which of the following access rights in the production envir...
Question 251: During a database audit, an IS auditor notes frequent proble...
Question 252: An IS auditor concludes that a local area network (LAN) acce...
Question 253: Which of the following could be determined by an entity-rela...
Question 254: Which of the following is MOST important for an IS auditor t...
Question 255: Which of the following is the MOST effective way for an IS a...
Question 256: The MAIN reason an organization's incident management proced...
Question 257: Which of the following should be performed FIRST when prepar...
Question 258: Attribute sampling is BEST suited to estimate:...
Question 259: An IS Auditor is performing a business continuity plan (BCP)...
Question 260: Which of the following activities is MOST important to consi...
Question 261: Which of ihe following is the BEST way to control scope cree...
Question 262: When preparing to evaluate the effectiveness of an organizat...
Question 263: Which of the following system deployments requires the cloud...
Question 264: Which of the following IS functions can be performed by the ...
Question 265: What is the PRIMARY advantage of prototyping as part of syst...
Question 266: Which of the following is MOST important for an IS auditor t...
Question 267: When introducing a maturity model to the IT management proce...
Question 268: While performing a risk-based audit, which of the following ...
Question 269: Which of the following is BEST addressed when using a timest...